THE INFORMATION IN THIS ARTICLE APPLIES TO:
- EFT v126.96.36.199 and 8.0.x
- This is fixed in EFT v188.8.131.52
Is EFT susceptible to the "Denial of service via recursive Deflate Stream" vulnerability?
Yes, you can be vulnerable if you are:
- Administering EFT remotely
- Allowing EFT remote administration to be initiated from the Internet
- Using the default port
- Not whitelisting trusted IPs
Sending a recursively compressed packet (a "quine") to the administration port can crash EFT. This can be mitigated by limiting access to administer EFT at the network level. You may be affected if you allow remote administration to EFT to be initiated from the internet. As stated in our best practices, do not expose port 1100 to the internet. You will always want to whitelist trusted IPs. The most secure method is to disallow remote administration outside of the host EFT server and only login in via localhost (::1 or 127.0.0.1).